/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 125 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write() 284 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 287 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 331 size_t msg_len; in dtls_get_message() local 363 msg_len = msg_hdr->msg_len; in dtls_get_message() 367 l2n3(msg_len, p); in dtls_get_message() [all …]
|
/freebsd/crypto/openssh/ |
H A D | msg.c | 70 u_int msg_len; in ssh_msg_recv() local 80 msg_len = get_u32(buf); in ssh_msg_recv() 81 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv() 82 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv() 86 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv() 90 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
|
H A D | ssh-pkcs11-helper.c | 277 u_int msg_len; in process() local 288 msg_len = get_u32(cp); in process() 289 if (msg_len > MAX_MSG_LENGTH) { in process() 290 error("bad message len %d", msg_len); in process() 293 if (buf_len < msg_len + 4) in process() 322 if (msg_len < consumed) { in process() 323 error("msg_len %d < consumed %d", msg_len, consumed); in process() 326 if (msg_len > consumed) { in process() 327 if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
|
H A D | umac.c | 782 UINT32 msg_len; /* Total length of data passed */ member 938 pc->msg_len = 0; in uhash_reset() 1056 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update() 1058 ctx->msg_len += len; in uhash_update() 1061 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update() 1062 if (ctx->msg_len == L1_KEY_LEN) in uhash_update() 1074 ctx->msg_len += bytes_remaining; in uhash_update() 1084 ctx->msg_len += L1_KEY_LEN; in uhash_update() 1094 ctx->msg_len += len; in uhash_update() 1109 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final() [all …]
|
/freebsd/sys/dev/ipmi/ |
H A D | ipmi_opal.c | 82 opal_ipmi_recv(struct opal_ipmi_softc *sc, uint64_t *msg_len, int timo) in opal_ipmi_recv() argument 91 *msg_len = sizeof(struct opal_ipmi_msg) + IPMI_MAX_RX; in opal_ipmi_recv() 95 vtophys(sc->sc_msg), vtophys(msg_len)); in opal_ipmi_recv() 112 sc->sc_msg->data[0], *msg_len); in opal_ipmi_recv() 126 uint64_t msg_len; in opal_ipmi_discard_msgs() local 133 err = opal_ipmi_recv(sc, &msg_len, 100); in opal_ipmi_discard_msgs() 137 err = opal_ipmi_recv(sc, &msg_len, 10); in opal_ipmi_discard_msgs() 148 uint64_t msg_len; in opal_ipmi_polled_request() local 169 msg_len = sizeof(*sc->sc_msg) + req->ir_requestlen; in opal_ipmi_polled_request() 171 msg_len); in opal_ipmi_polled_request() [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | print-olsr.c | 92 nd_uint16_t msg_len; member 102 nd_uint16_t msg_len; member 320 u_int msg_type, msg_len, msg_tlen, hello_len; in olsr_print() local 366 msg_len = GET_BE_U_2(msgptr.v6->msg_len); in olsr_print() 367 if ((msg_len >= sizeof (struct olsr_msg6)) in olsr_print() 368 && (msg_len <= length)) in olsr_print() 372 if (msg_type == 0 || msg_len == 0) { in olsr_print() 384 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); in olsr_print() 389 msg_tlen = msg_len - sizeof(struct olsr_msg6); in olsr_print() 395 msg_len = GET_BE_U_2(msgptr.v4->msg_len); in olsr_print() [all …]
|
H A D | print-ldp.c | 578 u_short pdu_len,msg_len,msg_type; in ldp_pdu_print() local 625 msg_len=GET_BE_U_2(ldp_msg_header->length); in ldp_pdu_print() 628 if (msg_len < sizeof(struct ldp_msg_header)-4) { in ldp_pdu_print() 636 msg_len, in ldp_pdu_print() 647 msg_len, in ldp_pdu_print() 652 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ in ldp_pdu_print() 655 ND_TCHECK_LEN(tptr, msg_len); in ldp_pdu_print() 694 msg_len); in ldp_pdu_print() 696 tptr += msg_len+4; in ldp_pdu_print() 697 tlen -= msg_len+4; in ldp_pdu_print()
|
/freebsd/crypto/openssl/crypto/sm2/ |
H A D | sm2_crypt.c | 101 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() 113 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in ossl_sm2_encrypt() 122 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() 194 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt() 221 if (!ossl_ecdh_kdf_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in ossl_sm2_encrypt() 227 if (is_all_zeros(msg_mask, msg_len)) { in ossl_sm2_encrypt() 232 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt() 242 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt() 259 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in ossl_sm2_encrypt() 308 int msg_len in ossl_sm2_decrypt() 89 ossl_sm2_ciphertext_size(const EC_KEY * key,const EVP_MD * digest,size_t msg_len,size_t * ct_size) ossl_sm2_ciphertext_size() argument 110 ossl_sm2_encrypt(const EC_KEY * key,const EVP_MD * digest,const uint8_t * msg,size_t msg_len,uint8_t * ciphertext_buf,size_t * ciphertext_len) ossl_sm2_encrypt() argument 290 int msg_len = 0; ossl_sm2_decrypt() local [all...] |
H A D | sm2_sign.c | 152 const uint8_t *msg, size_t msg_len) in sm2_compute_msg_hash() argument 186 || !EVP_DigestUpdate(hash, msg, msg_len) in sm2_compute_msg_hash() 406 const uint8_t *msg, size_t msg_len) in ossl_sm2_do_sign() argument 411 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign() 429 const uint8_t *msg, size_t msg_len) in ossl_sm2_do_verify() argument 434 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_verify()
|
/freebsd/crypto/openssl/test/ |
H A D | sm2_internal_test.c | 140 const size_t msg_len = strlen(message); in test_sm2_crypt() local 149 size_t recovered_len = msg_len; in test_sm2_crypt() 166 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, in test_sm2_crypt() 176 (const uint8_t *)message, msg_len, in test_sm2_crypt() 187 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt() 194 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt() 195 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt() 311 const size_t msg_len = strlen(message); in test_sm2_sign() 341 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 357 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 310 const size_t msg_len = strlen(message); test_sm2_sign() local [all...] |
/freebsd/sys/dev/qat/qat_common/ |
H A D | adf_pfvf_vf_proto.c | 253 unsigned int msg_len; in adf_send_vf2pf_blkmsg_req() local 306 msg_len = in adf_send_vf2pf_blkmsg_req() 308 msg_len = min(*buffer_len, msg_len); in adf_send_vf2pf_blkmsg_req() 311 for (index = ADF_PFVF_BLKMSG_HEADER_SIZE; index < msg_len; index++) { in adf_send_vf2pf_blkmsg_req() 320 ret = adf_vf2pf_blkmsg_get_crc(accel_dev, type, msg_len, &remote_crc); in adf_send_vf2pf_blkmsg_req() 324 local_crc = adf_pfvf_calc_blkmsg_crc(buffer, msg_len); in adf_send_vf2pf_blkmsg_req() 335 *buffer_len = msg_len; in adf_send_vf2pf_blkmsg_req()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | sm2.h | 41 const uint8_t *msg, size_t msg_len); 48 const uint8_t *msg, size_t msg_len); 68 size_t msg_len, size_t *ct_size); 75 const uint8_t *msg, size_t msg_len,
|
/freebsd/sys/arm/broadcom/bcm2835/ |
H A D | bcm2835_firmware.c | 116 size_t msg_len; in bcm2835_firmware_property() local 126 msg_len = sizeof(*msg_hdr) + len + sizeof(uint32_t); in bcm2835_firmware_property() 127 msg_hdr = malloc(sizeof(*msg_hdr) + msg_len + sizeof(uint32_t), in bcm2835_firmware_property() 130 msg_hdr->hdr.buf_size = msg_len; in bcm2835_firmware_property() 137 err = bcm2835_mbox_property(msg_hdr, msg_len); in bcm2835_firmware_property()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | preauth_test.c | 53 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 57 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 58 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 80 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 82 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
/freebsd/lib/libtacplus/ |
H A D | taclib_private.h | 81 u_int16_t msg_len; member 108 u_int16_t msg_len; member 127 u_int16_t msg_len; member
|
/freebsd/lib/libsys/ |
H A D | recvmmsg.c | 70 msgvec[0].msg_len = ret; in __ssp_real() 91 msgvec[i].msg_len = ret; in __ssp_real()
|
/freebsd/sys/dev/iavf/ |
H A D | iavf_vc_common.c | 290 memcpy(sc->vf_res, event.msg_buf, min(event.msg_len, len)); in iavf_get_vf_config() 693 int msg_len, key_length; in iavf_config_rss_key() local 705 msg_len = sizeof(struct virtchnl_rss_key) + (sizeof(u8) * key_length) - 1; in iavf_config_rss_key() 707 malloc(msg_len, M_IAVF, M_NOWAIT | M_ZERO); in iavf_config_rss_key() 721 (u8 *)rss_key_msg, msg_len); in iavf_config_rss_key() 769 int msg_len; in iavf_config_rss_lut() local 775 msg_len = sizeof(struct virtchnl_rss_lut) + (lut_length * sizeof(u8)) - 1; in iavf_config_rss_lut() 777 malloc(msg_len, M_IAVF, M_NOWAIT | M_ZERO); in iavf_config_rss_lut() 805 (u8 *)rss_lut_msg, msg_len); in iavf_config_rss_lut()
|
/freebsd/lib/libpam/modules/pam_tacplus/ |
H A D | pam_tacplus.c | 156 size_t msg_len; in pam_sm_authenticate() local 248 srvr_msg = (char *)tac_get_data(tach, &msg_len); in pam_sm_authenticate() 249 if (srvr_msg != NULL && msg_len != 0) { in pam_sm_authenticate()
|
/freebsd/sys/dev/atopcase/ |
H A D | atopcase.c | 140 uint16_t msg_len) in atopcase_process_message() argument 150 if (pl_len + sizeof(*hdr) + sizeof(crc) != msg_len) { in atopcase_process_message() 157 if (crc != crc16(0, msg, msg_len - sizeof(crc))) { in atopcase_process_message() 216 uint16_t length, remaining, offset, msg_len; in atopcase_receive_packet() local 300 msg_len = sc->sc_msg_len; in atopcase_receive_packet() 303 msg_len = length; in atopcase_receive_packet() 307 err = atopcase_process_message(sc, pkt.device, msg, msg_len); in atopcase_receive_packet()
|
/freebsd/usr.bin/gencat/ |
H A D | gencat.c | 554 int msg_len = strlen(msg->str) + 1; local 557 msg_hdr->__msglen = htonl(msg_len); 560 memcpy(strings, msg->str, msg_len); 561 strings += msg_len; 562 msg_offset += msg_len;
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-ED25519.pod | 69 void do_sign(EVP_PKEY *ed_key, unsigned char *msg, size_t msg_len) 77 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len); 80 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
|
/freebsd/contrib/libpcap/ |
H A D | pcap-netfilter-linux.c | 147 uint32_t msg_len; in netfilter_read_linux() local 277 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); in netfilter_read_linux() 290 if (msg_len > (uint32_t)(ep - bp)) in netfilter_read_linux() 291 msg_len = (uint32_t)(ep - bp); in netfilter_read_linux() 293 bp += msg_len; in netfilter_read_linux()
|
/freebsd/contrib/unbound/libunbound/ |
H A D | context.c | 372 q->msg_len = 0; in context_deserialize_answer() 379 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer() 381 q->msg_len); in context_deserialize_answer() 384 q->msg_len = 0; in context_deserialize_answer()
|
/freebsd/sys/netinet/libalias/ |
H A D | alias_smedia.c | 421 u_short msg_id, msg_len; in alias_pna_out() local 431 memcpy(&msg_len, work, 2); in alias_pna_out() 458 work += ntohs(msg_len); in alias_pna_out()
|